4.9 Fundamentals of Communication and Networking Flashcards
Baud Rate
The number of signals sent per second
Bit Rate
The rate at which bits are transferred
Bit rate >/ baud rate
Bandwidth
The capacity of wired/wireless network communications
Latency
The delay between transfer of data and seeing the result of that instruction
Protocol
Set of rules for data exchange across a network
Serial (2)
- one bit transmitted at once down one wire
- external distances
Parallel (2)
- multiple bits sent at once using multiple wires
- internal distances
Serial (Adv: 3, Dis: 1)
Adv
- simple set up
- cheap
- reliable
Dis
- slow transmission
Parallel (Adv: 1, Dis: 2)
Adv
- faster transmission
Dis
- less reliable (skew due to interference)
- expensive
Synchronous Transmission (5)
- data sent at regular intervals
- synchronised by clock signal
- clock pulse shared by receiver and sender
- helps with skew so used in parallel
- used for reliable, time sensitive data
Asynchronous Transmission (2)
- bytes sent as soon as they’re ready
- parity, start, stop
Bus Topology (2)
- one cable: backbone
- terminator at end of cable that reflects signal
Bus Topology (Adv: 3, Dis: 3)
Adv
- cheaper to install (less cables)
- no additional hardware
- easy to add nodes
Dis
- poor security
- main cable fail
- performance decreases heavily with traffic
Star Topology (1)
- each device has own cable connected to switch/hub
Star Topology (Adv: 5, Dis: 2)
Adv
- easy to add
- consistent performance despite traffic
- more secure
- easy to isolate faults (single cable fails)
- no collisions
Dis
- central node goes down
- expensive to set up
Client-Server (1, Adv:2, Dis:1)
- all data stored on dedicated server
- adv: centralised security/backups, files/software stored securely on server
- dis: server goes down
Peer-To-Peer (1, Adv:2, Dis:1)
- all devices have equal status
- adv: no specialised hardware, node goes down
- dis: no centralised security/backups/management
LANs and WANs Advantages (4)
- cheap, easy communication
- share files/hardware
- centralised file storage/install/update/back up
- log in from any device
WiFi (Def, 2)
- WiFi is a wireless LAN based on international standards
- slower and less reliable than ethernet
- Hot spots = public WiFi
NIC/Wireless Network Adaptor (4)
- Located in device
- Allows device to connect to wireless system
- Allows device to communicate by sending and receiving data
- Assigns MAC address
WAP (3)
- Located in router
- Allows wireless devices to connect to wired network
- Assigns IP address
Network Security (5)
- Doesn’t stop allowed user from using malware
- Protects against unauthorised access
- WPA/WPA2 -WiFi Protected Access
- Authentication, encryption, passwords
- SSID - Service Set Identifier
- Unique number to identify a network
- Must use same number to join network
- Turn off broadcasting (only those who know exist + password can join)
- MAC Address white list
- List of users (MAC addresses) who can access network
Firewalls (7)
- A system that filters network traffic to protect against unauthorised flows of data in/out of a network
- Hardware or software
- Isolates network traffic
- Allows/denies based on IP address
- Packet Filtering
- Checks packet header to see if source/destination addresses are allowed/denied
- Stateful Packet Inspection:
- Looks at data inside packet
- If any common warning signs, packet is stopped from progressing
- Packet only allowed if passes both
Proxy Servers (4)
- Act as ‘middle man’ between client and webserver
- Client ←→ Proxy Server ←→ Web Server
- Once obtained from web, copy of data stored on proxy server
- After while, proxy server sends data back to web server to free up space
Malware (def)
Software created with intention to cause harm
Corrupts and compromises data
Viruses (6)
- Attaches itself to program/file, by making copy of itself
- enabling it to spread from one device to another
- Typically executable files
- Means cannot spread without human interaction
- Spread through lack of awareness
- Exploits same vulnerabilities as worms
Worms (5)
- Similar to viruses in design
- Doesn’t need human interaction to spread
- Automatically self replicates
- Automatically sends itself to everyone in address book via email
- Exploits out of date systems - no security updates
Trojans (5)
- Appear genuine but have hidden agenda
- Attached to executable file
- Create backdoors which malicious users can exploit
- Doesn’t spread, self-replicate, cause harm
- Exploits lack of understanding and systems with out of date anti virus software
Symmetric Encryption (4)
- One key for both
- Key exchanged through secured channels
- Easy decoded
- e.g. caesar, vernam
Asymmetric Encryption (keys)
Public key = encrypt
Private key = decrypt
Extremely secure
Digital Certificates (4)
- Unique code to verify your identity
- Ensures encrypted message from trusted source
- Contains name, ID, public key, signature
- Awarded by a certification authority (trusted organisation)
Digital Signatures (2)
- Similar to real life signature
- Uses mathematical functions + keys to create unique signature
Digital Signatures Used for (2)
- Message has not been corrupted
- Sender is who they say they are
Digital Signatures - Sending Messages
- Hash plaintext message → message digest
- Sender private key + digest → signature
- Signature + plaintext message
- Encrypt using receiver’s public key
- Send message
- Decrypt using receiver’s private key
- Split signature and plaintext message
- Sender’s public key + signature → digest
- Rehash plaintext → message digest
- Compare two digests to see if the same